• About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
Tech News, Magazine & Review
  • Home
  • Shop
  • Tech News
    You can replace DLSS with AMD FSR 2.0 in Cyberpunk 2077 with this mod

    You can replace DLSS with AMD FSR 2.0 in Cyberpunk 2077 with this mod

    The Sabrent Rocket 4 Plus Destroyer 2 SSD has up to 64 terabytes of speedy storage

    The Sabrent Rocket 4 Plus Destroyer 2 SSD has up to 64 terabytes of speedy storage

    Stadia

    Stadia code change hints Google is prepping Nvidia GPU support

    Intel Core i9-13900 engineering sample is 20% faster than Alder Lake in new benchmarks

    Intel Core i9-13900 engineering sample is 20% faster than Alder Lake in new benchmarks

    AMD Threadripper Pro 5000 to expand availability to more OEMs, hit retail eventually

    AMD Threadripper Pro 5000 to expand availability to more OEMs, hit retail eventually

    YouTube Music can now recommend songs when you connect to earbuds

    YouTube Music can now recommend songs when you connect to earbuds

    Meta logo on a smartphone

    Meta shuts down social media post tracking tool on Facebook

    TikTok is reportedly on pace to rake in $12 billion this year

    TikTok is reportedly on pace to rake in $12 billion this year

  • Review
    The best instant cameras you can buy right now

    The best instant cameras you can buy right now

    Google’s Pixel 5 was the last of its kind

    Google’s Pixel 5 was the last of its kind

    Starlink RV review: the dawn of space internet to go

    Starlink RV review: the dawn of space internet to go

    Poco F4 GT

    Poco F4 GT

    Toyota bZ4X electric SUV review: mediocre at best

    Toyota bZ4X electric SUV review: mediocre at best

    6 Cores vs. 8 Cores for Gaming: 24 Game Benchmark

    6 Cores vs. 8 Cores for Gaming: 24 Game Benchmark

    Edifier MP230

    Edifier MP230

    Amazon Basics Rechargeable AAA 800mAh

    Amazon Basics Rechargeable AAA 800mAh

  • Gear
    Apple TV Siri Remote hinted in iOS 16 beta

    Apple TV Siri Remote hinted in iOS 16 beta

    amazon echo

    Amazon shows off Alexa’s new in-development ability to mimic anyone dead or alive

    Samsung Pay no longer functioning on smartphones from other manufacturers

    Samsung Pay no longer functioning on smartphones from other manufacturers

    Apple

    Apple’s AR glasses are currently in the design development stage: report

    Meta is working on several VR prototypes that aim to pass the Visual Turing test

    Meta is working on several VR prototypes that aim to pass the Visual Turing test

    Sony's Walkman is making a pricey digital comeback

    Sony’s Walkman is making a pricey digital comeback

  • Gaming
    AMD Engineer Confirms RDNA3 GPU Power Consumption Will Increase - ExtremeTech

    AMD Engineer Confirms RDNA3 GPU Power Consumption Will Increase – ExtremeTech

    Cyberpunk 2077 is getting a board game

    Cyberpunk 2077 is getting a board game

    The best tech and gadget gifts for less than $25

    The best tech and gadget gifts for less than $25

    Games Done Quick’s summer marathon kicks off Sunday, and there’s a lot to look forward to

    Games Done Quick’s summer marathon kicks off Sunday, and there’s a lot to look forward to

    Microsoft Adds a Ton of New Gaming Features to Edge - ExtremeTech

    Microsoft Adds a Ton of New Gaming Features to Edge – ExtremeTech

    Legendary designer Yu Suzuki returns with a wild arcade shooter

    Legendary designer Yu Suzuki returns with a wild arcade shooter

    Amazon Offering Fire TV Stick With a Wireless Game Controller in India to Attract Casual Gamers

    Amazon Offering Fire TV Stick With a Wireless Game Controller in India

    Chris Pratt says his Mario voice is ‘unlike anything you’ve heard’

    Chris Pratt says his Mario voice is ‘unlike anything you’ve heard’

  • Smart Phones
    VPN

    ClearVPN is so pretty that it doesn’t feel like a VPN. But it works like one — and it’s 80% off

    article thumbnail

    Harber Leather Desk Mat review: a comfortable, desirable Mac accessory | AppleInsider

    Asus ROG Phone 5/5S problems and how to fix them

    Asus ROG Phone 5/5S problems and how to fix them

    article thumbnail

    How to download Xcode faster | AppleInsider

    article thumbnail

    Daily deals June 25: $175 AirPods Pro, $40 Amazon Kindle, $30 OtterBox MagSafe Power Bank, more | AppleInsider

    Apple iPhone logo macro

    Should Apple M2 iPads worry the Pixel Tablet crowd?

    Google Pixel 7

    Pixel 7 Pro prototype reveals some details about second-gen Tensor

    article thumbnail

    13-inch MacBook Pro with M2 processor review: Incremental upgrade and unexciting | AppleInsider

  • More
    • Apps & Software
    • Computing
    • Security
No Result
View All Result
  • Home
  • Shop
  • Tech News
    You can replace DLSS with AMD FSR 2.0 in Cyberpunk 2077 with this mod

    You can replace DLSS with AMD FSR 2.0 in Cyberpunk 2077 with this mod

    The Sabrent Rocket 4 Plus Destroyer 2 SSD has up to 64 terabytes of speedy storage

    The Sabrent Rocket 4 Plus Destroyer 2 SSD has up to 64 terabytes of speedy storage

    Stadia

    Stadia code change hints Google is prepping Nvidia GPU support

    Intel Core i9-13900 engineering sample is 20% faster than Alder Lake in new benchmarks

    Intel Core i9-13900 engineering sample is 20% faster than Alder Lake in new benchmarks

    AMD Threadripper Pro 5000 to expand availability to more OEMs, hit retail eventually

    AMD Threadripper Pro 5000 to expand availability to more OEMs, hit retail eventually

    YouTube Music can now recommend songs when you connect to earbuds

    YouTube Music can now recommend songs when you connect to earbuds

    Meta logo on a smartphone

    Meta shuts down social media post tracking tool on Facebook

    TikTok is reportedly on pace to rake in $12 billion this year

    TikTok is reportedly on pace to rake in $12 billion this year

  • Review
    The best instant cameras you can buy right now

    The best instant cameras you can buy right now

    Google’s Pixel 5 was the last of its kind

    Google’s Pixel 5 was the last of its kind

    Starlink RV review: the dawn of space internet to go

    Starlink RV review: the dawn of space internet to go

    Poco F4 GT

    Poco F4 GT

    Toyota bZ4X electric SUV review: mediocre at best

    Toyota bZ4X electric SUV review: mediocre at best

    6 Cores vs. 8 Cores for Gaming: 24 Game Benchmark

    6 Cores vs. 8 Cores for Gaming: 24 Game Benchmark

    Edifier MP230

    Edifier MP230

    Amazon Basics Rechargeable AAA 800mAh

    Amazon Basics Rechargeable AAA 800mAh

  • Gear
    Apple TV Siri Remote hinted in iOS 16 beta

    Apple TV Siri Remote hinted in iOS 16 beta

    amazon echo

    Amazon shows off Alexa’s new in-development ability to mimic anyone dead or alive

    Samsung Pay no longer functioning on smartphones from other manufacturers

    Samsung Pay no longer functioning on smartphones from other manufacturers

    Apple

    Apple’s AR glasses are currently in the design development stage: report

    Meta is working on several VR prototypes that aim to pass the Visual Turing test

    Meta is working on several VR prototypes that aim to pass the Visual Turing test

    Sony's Walkman is making a pricey digital comeback

    Sony’s Walkman is making a pricey digital comeback

  • Gaming
    AMD Engineer Confirms RDNA3 GPU Power Consumption Will Increase - ExtremeTech

    AMD Engineer Confirms RDNA3 GPU Power Consumption Will Increase – ExtremeTech

    Cyberpunk 2077 is getting a board game

    Cyberpunk 2077 is getting a board game

    The best tech and gadget gifts for less than $25

    The best tech and gadget gifts for less than $25

    Games Done Quick’s summer marathon kicks off Sunday, and there’s a lot to look forward to

    Games Done Quick’s summer marathon kicks off Sunday, and there’s a lot to look forward to

    Microsoft Adds a Ton of New Gaming Features to Edge - ExtremeTech

    Microsoft Adds a Ton of New Gaming Features to Edge – ExtremeTech

    Legendary designer Yu Suzuki returns with a wild arcade shooter

    Legendary designer Yu Suzuki returns with a wild arcade shooter

    Amazon Offering Fire TV Stick With a Wireless Game Controller in India to Attract Casual Gamers

    Amazon Offering Fire TV Stick With a Wireless Game Controller in India

    Chris Pratt says his Mario voice is ‘unlike anything you’ve heard’

    Chris Pratt says his Mario voice is ‘unlike anything you’ve heard’

  • Smart Phones
    VPN

    ClearVPN is so pretty that it doesn’t feel like a VPN. But it works like one — and it’s 80% off

    article thumbnail

    Harber Leather Desk Mat review: a comfortable, desirable Mac accessory | AppleInsider

    Asus ROG Phone 5/5S problems and how to fix them

    Asus ROG Phone 5/5S problems and how to fix them

    article thumbnail

    How to download Xcode faster | AppleInsider

    article thumbnail

    Daily deals June 25: $175 AirPods Pro, $40 Amazon Kindle, $30 OtterBox MagSafe Power Bank, more | AppleInsider

    Apple iPhone logo macro

    Should Apple M2 iPads worry the Pixel Tablet crowd?

    Google Pixel 7

    Pixel 7 Pro prototype reveals some details about second-gen Tensor

    article thumbnail

    13-inch MacBook Pro with M2 processor review: Incremental upgrade and unexciting | AppleInsider

  • More
    • Apps & Software
    • Computing
    • Security
No Result
View All Result
No Result
View All Result
Home Security

Behavioral analytics and why it’s important to threat detection and response [Q&A]

admin by admin
April 15, 2022
Behavioral analytics and why it's important to threat detection and response [Q&A]
Share on FacebookShare on Twitter


AI security

Traditional rule-based security techniques centered on malware signatures and perimeter protection are increasingly unable to cope with the latest, more sophisticated threats.

Taking a more behavior-based approach to spotting unusual or risky activity offers a solution, but what is required to make it work? We spoke to Sanjay Raja, VP of product marketing and solutions at cybersecurity specialist Gurucul, to find out.

BN: What is behavior analytics and why is it important in threat detection?

SR: Behavioral risk analysis examines network, application, cloud, user, and device activity for behavior that is both unusual and high-risk. This requires machine learning (ML) models that baseline normal behavior and look for anomalies. But not all unusual activities are risky. For example, consider a marketing employee accessing marketing materials from a SharePoint drive for the first time in several months. This is unusual compared to her normal behavior, but likely relatively low risk. But that same employee accessing code repositories from an unfamiliar location in the middle of the night when most employees are offline is much riskier and should be flagged.

When done successfully, behavioral risk analysis can improve efficiency, reduce false positives, and detect insider threats and zero-day attacks that other threat detection methods cannot. As a side benefit, the ML analysis involved can also produce valuable data on how systems and devices are used (for example, looking at the normal usage patterns for a system or a set of devices could let the IT team know the best time to shut it down for updates).

BN: What makes for good behavior analytics software?

SR: It’s the technology behind the software that really makes it effective. A good behavioral analytics system will leverage true ML to detect and adapt to both known and unknown threats by conducting a risk analysis.

Conducting risk analysis involves determining the risk level of behaviors, which requires gathering a large amount of contextual data (usually into a data lake), correlating and linking that data to unique users and entities, running behavior analytics powered by ML, calculating a risk score based on that data, looking at an anomaly in light of that risk score, and prioritizing it accordingly. This helps to reduce false positives (behavior that is unusual, but low risk often triggers a false positive alert in less sophisticated solutions). This contextual information is the key to identifying what behaviors are risky or not. Contextual data might include relevant information to an incident such as events, network segments, assets or accounts involved. This contextual data is then sent to security teams to give context when further analyzing a detected threat.

BN: What are the differences between rule-based and machine learning in behavior analytics?

SR: Although rule-based and machine learning behavioral analytics may seem similar on the surface, they actually function very differently. Rule-based detection is often sold as AI or ML but isn’t true AI or ML at all. Rule-based detection is essentially a flowchart that goes through a preset series of steps or tests (inputs) regardless of context and generates an alert (or output) if predetermined criteria are met. Machine learning engines will take context into account and assess how risky and how unusual a certain behavior is. For example, machine learning engines use baselines, peer group analytics, and anomaly detection to identify unusual behavior, like users accessing the network from unrecognized IP addresses, users downloading copious amounts of IP from sensitive document repositories not associated with their role, or server traffic from countries that the organization does not do business with.

The first key differences between these two detection engines is their ability to adapt to new variants of cyber-attacks. A rule-based detection system has a hard time detecting and adapting to new variants of malware and needs to be manually updated with every new variant that attacks the system. This results in slower behavioral analytics software that often will detect attacks too late. Whereas machine learning systems will detect new variants of malware by noticing suspicious network activities associated with it, even if the file itself is not known to be malicious, and flag security teams to further analyze the threat.

Another important difference between these two approaches is the need for human interaction. Rule-based detection systems need to be constantly manually updated by the vendor or security team. Depending on how responsive the vendor is or how experienced the security team is, this process can take days or even weeks. This in turn could result in a company’s data being further exploited, which creates heavy costs and more manual work for enterprises and their security teams. With machine learning, the need for human interaction and updating is greatly reduced because the system will automatically learn and adapt to new attacks and their variants.

BN: How has behavioral analytics technology changed in recent years and what improvements are on the horizon?

SR: Behavioral analytics technology has evolved significantly over the years with the implementation of true machine learning (moving past the rule-based approach) leveraging supervised, unsupervised and deep learning techniques. As malware became more advanced and tactics like code obfuscation became more common, rule-based systems have had a hard time adapting to the new malware landscape. As machine learning models have become more sophisticated, behavioral analytics has improved in tandem.

The use of ML has allowed security teams to detect different kinds of threats and reduce costs in ways that could never be done before. Behavioral risk analytics has great potential to make threat detection more efficient and keep organizations safer. Building robust ML analytics drawn from adequate input data will be key to the success of this approach over the next several years as this technology becomes more standard in next-generation security systems.

BN: What are the choices businesses have when choosing and implementing threat detection and what should they do to be successful?

SR: With all of the different types of threat detection available, it can be both overwhelming and confusing for businesses to find and choose the right security product that fits their needs, skill levels and budget. One of the best things that a CISO can do is define their security needs and communicate them clearly with the security team.

When evaluating threat detection solutions from vendors, businesses should ask important questions such as:

  • Will my team have to do a lot of manual correlation, and how are they able to accomplish that with events that span weeks or even months?
  • Will my team have to search through multiple tools and put together context on their own to see patterns that will help formulate a better response when working with other IT teams?
  • How can my threat detection platform automate certain tasks and bring the right context to the forefront?
  • How can it provide the necessary context that can help a less-experienced analyst learn over time and increasingly add value?

BN: What problems or roadblocks prevent organizations from using behavioral analytics successfully in threat detection programs?

SR: One major problem that hinders many organizations is not gathering enough data to feed threat detection tools. If these tools don’t have complete networking or device data, then security issues could slip past in those blind spots. Too little data also means that threat detection cannot be as precise or contextual, which in turn means more false positive alerts and more work for SOC analysts to investigate and respond to the actual threats. Organizations might be restricting their input data because they mistakenly believe that doing things like turning on NetFlow will slow down network performance. Others might have a threat detection solution that charges based on the volume of data it ingests, so they are limiting inputs to keep costs down. In addition, many rule-based threat detection solutions cannot ingest ‘unstructured’ data from sources like proprietary business applications, Industrial Control Systems, IoT devices, or healthcare devices because it is not in a format they recognize.

A second issue is the quality of the ML models that the behavioral analytics relies on. The more models a solution has, the more detailed each one can be. This means they’ll be more accurate and the solution will cover a wider range of security threats overall. A robust behavioral analytics solution should have hundreds of ML models. Many solutions also have proprietary ML models that can’t be verified or customized. This also creates roadblocks because the user cannot verify that the models are working as intended and cannot modify them to respond to new threats. A better option is to choose a vendor that offers open analytics so that companies can customize the vendor’s machine learning models or build their own.

Image Credit: agsandrew / depositphotos.com





Source link

admin

admin

Related Posts

Google says attackers worked with ISPs to deploy Hermit spyware on Android and iOS

Google says attackers worked with ISPs to deploy Hermit spyware on Android and iOS

June 25, 2022
Majority of Americans fear some form of cyberwarfare

Why we need to take the threat of cyberwarfare seriously [Q&A]

June 24, 2022
Tips for securing Windows with PowerShell... courtesy of the NSA

Tips for securing Windows with PowerShell… courtesy of the NSA

June 24, 2022
Weekend at Johnny's: McAfee's body remains at morgue one year after his death

Weekend at Johnny’s: McAfee’s body remains at morgue one year after his death

June 23, 2022
Next Post
Nvidia Says Its RTX 30-Series GPUs are 'Restocked and Reloaded' - ExtremeTech

Nvidia Says Its RTX 30-Series GPUs are 'Restocked and Reloaded' - ExtremeTech

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Trending
  • Comments
  • Latest
Alienware x17 R2 (2022)

Alienware x17 R2 (2022)

June 2, 2022
Toshiba 65UK3163DB

Toshiba 65UK3163DB

April 18, 2022
article thumbnail

Compared: Amazon Fire 7 2022 vs iPad mini & 10.2-inch iPad | AppleInsider

May 22, 2022
How to deactivate your Twitter account

How to deactivate your Twitter account

April 14, 2022
Intel Arc A770 desktop GPU debuts in the Geekbench database

Intel Arc A770 desktop GPU debuts in the Geekbench database

0
New evidence supporting the existence of the Google Pixel Watch emerges

New evidence supporting the existence of the Google Pixel Watch emerges

0
Microsoft is developing an in-game advertising system for free-to-play games

Microsoft is developing an in-game advertising system for free-to-play games

0
WhatsApp testing ability to hide ‘Last Seen’ status from specific contacts on iOS

WhatsApp testing ability to hide ‘Last Seen’ status from specific contacts on iOS

0
VPN

ClearVPN is so pretty that it doesn’t feel like a VPN. But it works like one — and it’s 80% off

June 26, 2022
Google says attackers worked with ISPs to deploy Hermit spyware on Android and iOS

Google says attackers worked with ISPs to deploy Hermit spyware on Android and iOS

June 25, 2022
article thumbnail

Harber Leather Desk Mat review: a comfortable, desirable Mac accessory | AppleInsider

June 25, 2022
Asus ROG Phone 5/5S problems and how to fix them

Asus ROG Phone 5/5S problems and how to fix them

June 25, 2022

Don't Miss.

Apple to bring on Hollywood directors to create video content for the rumoured headset

Apple to bring on Hollywood directors to create video content for the rumoured headset

June 4, 2022
Sony's new Walkman players are for serious and seriously rich audiophiles

Sony’s new Walkman players are for serious and seriously rich audiophiles

June 15, 2022
The Callisto Protocol’s director on his return to horror: ‘I don’t know what too scary is’

The Callisto Protocol’s director on his return to horror: ‘I don’t know what too scary is’

June 15, 2022
Sonic Frontiers -- Sonic stands on ledge looking surprised

Here’s seven minutes of Sonic Frontiers open-world gameplay

June 1, 2022

GIZMOZOD

Gizmozod is dedicated to providing you the latest news and other information about the tech world that you just need to know. It publishes news related to various tech fields like smartphones, computing, smart home, automotive, gaming, cybersecurity and so on.

Follow Us

Categories

  • Apps & Software
  • Computing
  • Gaming
  • Gear
  • Review
  • Security
  • Smart Phones
  • Tech News

Recent News

VPN

ClearVPN is so pretty that it doesn’t feel like a VPN. But it works like one — and it’s 80% off

June 26, 2022
Google says attackers worked with ISPs to deploy Hermit spyware on Android and iOS

Google says attackers worked with ISPs to deploy Hermit spyware on Android and iOS

June 25, 2022

Join Our Newsletter!


    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions

    gizmozod © 2022| All rights reserved.

    No Result
    View All Result
    • Home
    • Shop
    • Tech News
    • Review
    • Gear
    • Gaming
    • Smart Phones
    • More
      • Apps & Software
      • Computing
      • Security

    gizmozod © 2022| All rights reserved.